Skip to main content

Currently Skimming:

8 Authentication Technologies
Pages 48-52

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 48...
... If I were trying to subvert a secure system, I would wait for the next communications protocol to be implemented or the next revision to the operating system to be installed. We have unlimited opportunities with computer systems to change whatever works today into something that will not work tomorrow.
From page 49...
... For example, in the case of automated teller machine transactions, a very small error rate in identification would make them unacceptable. If you do not have enormous confidence in the identification process, it is not iDavid Forsyth gave the following example: He has a piece of paper given to him by someone trusted that says, "David Forsyth knows the factors of this very long number." He gives someone else that piece of paper and tells the person these factors.
From page 50...
... A technology that is secure today may not be secure tomorrow. Today we have very high confidence in digital signatures based on public key cryptography.2 The digital signing processes are good.
From page 51...
... However, in the online world, banks and brokerage firms do not strongly verify the identity of their customers anymore; they have necessarily resorted to less secure verification processes. A very secure process and database are necessary to assign cryptographic keys.
From page 52...
... In banking, when you get to the top, only a few people are necessary to make a phone call to gain agreement that, "Yes, we'll take care of that." Although real attacks have been made against our systems, if you want to steal a million dollars, it is still much easier to make friends with the branch manager than to figure out how to break into the automated money transfer systems. Security technology has tended to stay a step ahead of what is practical in the world of financial fraud.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.